Identity Protection

Only available on StudyMode
  • Download(s) : 14
  • Published : January 30, 2013
Open Document
Text Preview
IDENTITY PROTECTION

Table of Content 1. Abstract 2 2. Background and History

I. Personal identity theft 3 II. Business identity theft 4

3. Problems and Controversies
Problems 4 Controversies 6 How do they get it? 8 Noticing something is wrong 12

4. Fostering International Cooperation on Identity Protection 14

5. Government Attempts to Protect Individual’s Identity 16

6. Personal Attempts for Identity Protection 19

7. References 23

8.

ABSTRACT

Identification is ever more important in the online world, and identity-related crime is a growing problem related to this. This new category of crime is not restricted to high-profile instances of identity ‘theft’ or identity fraud; it is wide-ranging and complex, ranging from identity deletion to unlawful identity creation and identity ‘theft’. Identity theft is not always detectable by the individual victims, according to a report done for the FTC. Identity fraud is often but not necessarily the consequence of identity theft. Someone can steal or misappropriate personal information without then committing identity theft using the information about every person, such as when a major data breach occurs. A US Government Accountability Office study determined that "most breaches have not resulted in detected incidents of identity theft". the report also warned that "the full extent is unknown". A later unpublished study by Carnegie Mellon University noted that "Most often, the causes of identity theft is not known," but reported that someone else concluded that "the probability of becoming a victim to identity theft as a result of a data breach is ... around only 2%". More recently, an association of consumer data companies noted that one of the largest data breaches ever, accounting for over four million records, resulted in only about 1,800 instances of identity theft, according to the company whose systems were breached. In order to assess the real nature and magnitude of identity-related crime, and to be able to discuss how it can be combated, identity-related crime should be understood in all its aspects.

As a first key step, this article introduces a typology of identity-related crime, consisting of Problems, Controversies and Solutions. Solution Category is subdivided in International Cooperation, Government attempts and personal steps to be taken. Governments attempts are mostly consist of compilation recommendations of ‘President’s Task Force on Identity Theft’. And under personal steps section, there are 8 recommended protection solutions offered readers.

Background and History
Identity theft is frequently mentioned in today’s society; the crime is often reported in the news. Advertisements warn consumers to review their credit reports, and companies offer insurance, credit monitoring, and early detection products. By and large, identity theft is not considered a serious crime, but is often thought of as a nuisance crime in which a person’s information, such as credit card number, is stolen and used to make purchases. Though many may think of it as a new social phenomenon created by increased reliance upon technology, in reality it is a...
tracking img